Hello, greetings, and welcome to Conversational Unified
Communications. I’m Brien Posey. For those of you who don’t
know me, I am a long time Conversational Geek author, and
17-time Microsoft MVP. My professional background is in both
IT and in commercial astronautics. It’s an odd combination for
sure. I sometimes find myself setting up virtual machines on
one day, and being strapped into a space capsule the next day
(seriously). Thankfully, Peter, Nick, and the rest of the folks at
Conversational Geek have embraced my unorthodox (dare I say
eccentric) career choices and have allowed me to author books
on subjects ranging from the cloud computing to real life
rocket science. I would like to personally invite you to go to
ConversationalGeek.com and check out some of these other
In this book, I want to talk about unified communications.
Those of you who follow my work may recall that back in 2009 I
wrote another book about unified communications called Brien
Posey’s Guide to Pract
Published By: Nutanix
Published Date: Aug 22, 2019
Today, companies of all sizes face growing threats from shifting consumer habits, global competitors, and well-funded startups.
Digital transformation, cloud computing, and the dynamic nature of global business have changed business expectations, making
IT an essential driver of revenue and an ever more critical part of your business. Your IT team is looking for ways to accelerate
the adoption of digital technologies to increase customer engagement, streamline business processes, and gain a sustainable
Rapid change is underway in the world of digital government. This is not only being driven by huge advances in technology, but also a global community unified by new thinking, bold ideas, and cost-effective, scalable solutions.
Published By: Gigamon
Published Date: Sep 03, 2019
The IT pendulum is swinging to distributed computing environments, network perimeters are dissolving, and
compute is being distributed across various parts of organizations’ infrastructure—including, at times, their extended
ecosystem. As a result, organizations need to ensure the appropriate levels of visibility and security at these remote
locations, without dramatically increasing staff or tools. They need to invest in solutions that can scale to provide
increased coverage and visibility, but that also ensure efficient use of resources. By implementing a common
distributed data services layer as part of a comprehensive security operations and analytics platform architecture
(SOAPA) and network operations architecture, organizations can reduce costs, mitigate risks, and improve operational
"Malicious cryptomining has consistently been one of the top threats across all internet activity in 2018. Cryptominers tap into an organization’s computing power to create cryptocurrencies like Bitcoin and Monero — and generate profit for themselves. If you’re not protected, it can cost you in all kinds of ways. It can lead to degraded system performance and regulatory risks, and leaves an attacker with an open door to further exploit your network.
In this eBook you’ll learn about who these criminals are targeting and how you can protect your network from a significant threat.
"Malicious cryptomining lets cybercriminals profit at your organization’s expense. No industry is safe from malicious cryptomining - a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. This fast-growing threat can lead to degraded system performance, soaring electricity usage, regulatory problems, and vulnerability to future attacks.
View our infographic to find out who they’re targeting and how to protect your network.
"Malicious cryptomining is a browser or software-based threat that enables attackers to secretly use an organization's computing power to mine digital currency. Why should you care? Cryptomining is the fastest-growing threat today, and cryptomining in your environment means you are vulnerable to other attacks. Malicious cryptomining also leads to hidden costs to your organization from stolen computing resources.
Learn more about this fast-growing threat and how Cisco Umbrella can help.
City leaders around the world are working to improve the quality of life and increase the number of useful services for their citizens, businesses, and visitors. Smart city initiatives are gaining attention in several countries, as administrators, industry, and citizens are working together to enhance their communities, cities, regions, and nations. After more than ten years of smart city hype, innovative projects have emerged, but few have provided a disruptive impact on the city system itself. Because every city is different, few of the existing models apply universally. An effective response requires leaders to consider a series of prerequisites:
• Consider the local culture and the people • Prioritize basic needs and requests • Work at overcoming silos and encourage collaboration across departments • Consider each “smart” initiative as an integral part of an overall city system
A smart city reflects a number of aspirations: efficiency, resiliency, connectedness, innovatio
Innovation requires many ingredients: a great idea, creativity, persistence, the right data, and technology. Governments around the world are taking advantage of the cloud to reduce cost and transform the way they deliver on their mission. The expectations of an increasingly digital citizenry are high, yet all levels of government face budgetary and human resource constraints. Cloud computing (on-demand delivery of IT resources via the Internet with pay-as-you-go pricing) can help government organizations increase innovation, agility, and resiliency, all while reducing costs. This whitepaper provides guidelines that governments can use to break down innovation barriers and achieve a digital transformation that helps them engage and serve citizens.
AWS worked with FedRAMP to develop a set of standards under which highly sensitive government data could securely migrate into cloud environments. If ever you doubted that cloud computing was the new frontier for federal data and software management, look around
Amazon Web Services (AWS) provides rapid access to flexible and low cost IT resources. With cloud computing, public sector organizations no longer need to make large upfront investments in hardware, or spend time and money on managing infrastructure. The goal of this whitepaper is to help you gain insight into some of the financial considerations of operating a cloud IT environment and learn how to maximize the overall value of your decision to adopt AWS.
In Forrester’s evaluation of the emerging market for conversational computing platforms, we identified the seven most significant providers — Amazon, Google, IBM, Microsoft, Nuance Communications, Oracle, and Rulai — in the category and evaluated them. This report details our findings about how each vendor scored against nine criteria and where they stand in relation to each other. Application developers should use this review to select the right partners for their conversational computing platform needs.
Organizations are charging ahead with investments in cloud and analytics to deliver agility, scalability and cost savings. With computing power advancements and continuous growth of data, cloud provides the elastic workloads and flexibility required for modern business. However, the environment of flexibility and choice that cloud provides also creates complexity and challenges.
In this white paper, learn how organizations are applying expertise and using the latest methods to move analytics to the cloud, including:
• Why are organizations moving analytic work to the cloud?
• What are the key challenges and misconceptions?
• How do IT leaders provide choice while maintaining control?
Dresner Advisory Services’ eighth annual Cloud Computing and Business Intelligence
Market Study in 2019 shows user confidence at an all-time high, with cloud offerings
outnumbering traditional on-premises offerings.
Sentiment toward cloud and cloud BI turned sharply positive in 2018, with current and
future user plans both trending up. Results from our 2019 Dresner Advisory Services
New Year User Survey reinforced those findings with ongoing momentum. Sentiment is
at an all-time high, and the majority of organizations—51 percent—use cloud BI in 2019.
Cloud-based BI vendor products and services are now more plentiful than traditional onpremises products. Still, vendors support any deployment option the customer chooses:
public, private, or hybrid, at multiple levels of scale and price. Customers benefit from
these choices, which reduce the chance for vendor lock-in.
Users have not settled on deployment models but are migrating toward subscription and
the adoption of managed services. Ou
Published By: Iovation
Published Date: Aug 02, 2019
The digitalization of business processes and the advent of mobile computing have given rise to the next generation of fraud. Cybercriminals have a variety of tools and techniques—as well as opportunities—to steal money and services. Furthermore, traditional fraud prevention tools often fail to stop this fraudulent activity.
Companies need a new approach to fraud prevention—one that stops fraud early and preserves the user experience. Companies with an online presence must have the ability to:
Detect and respond to fraudulent activity before incurring losses
Leverage human insight and machine learning to identify advanced fraud
Work with other fraud analysts to identify larger fraud trends and stop cybercriminals on a global scale
Block more fraud while reducing fraud prevention costs
This book explores how companies can leverage a next-generation fraud prevention solution to stop more fraud while reducing costs and providing a positive user experience for trusted customers.
In this e-book, you’ll discover
1. How next-generation cloud technologies such
as customer journey mapping platforms and
advanced analytics are poised to transform the
2. The top operational and technical challenges
that next-generation cloud technologies tackle.
3. Examples of how companies can tap into
next-gen cloud technologies to elevate the
Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.
At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.
More than 80% of organizations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape.
New agile solutions are required that can address today's threats and enable organizations to adjust their security posture as the threat landscape evolves.
Download this whitepaper to know more about key recommendations including:
• Working with third parties to evaluate your current cybersecurity posture and identify vulnerabilities
• Upgrading and update your cybersecurity assets with a particular focus on ensuring that firewalls are upgraded
• Ensuring that your organization has a unified view of your assets and the threat environment
To be successful, businesses must select a secure, scalable and reliable computing platform. At the same time, they also demand openness so development teams can slect tools & technologies they are skilled in using. In this book, discover how IBM LinuxOne platform can play a critical role in developing your enterprise computing strategy and understand the full overview of the value of LinuxONE when compared to other platforms.
Cyberspace is extremely difficult to secure. The basic
approach to security is proving to be inadequate to the demands of the aggressive nature of the environment. A paradigm shift is necessary and soon.
In this whitepaper, discover a possible change from a selective model to one that is pervasive. A significant modification in the basic structure of computing that is easy to implement and removes all barriers to full scale encryption.
This white paper is a business briefing for C-Level Executives on how integrating a range of technologies - including unified communications, service oriented architecture, virtualization and cloud computing - can transform the productivity and profitability of large enterprises.
Published By: SAP Concur
Published Date: Aug 07, 2019
"A successful CFO stays abreast of financial technology trends, and how they will impact their organization both now and in the future. Get informed with this SAP Concur sponsored CFO whitepaper. You’ll learn about the 5 latest trends in fintech that should be on any CFO’s radar.
By applying these CFO trends strategically to your financial processes, you will:
- Streamline back-office operations through the use of robotics
- Integrate the next-generation of cloud computing
- Learn the most strategic ways to improve budgeting procedures
Download the Whitepaper today"
Botnets are based on similar principles as legitimate clouds, but serve malicious business interests. Find out more about how botnets work and the right steps after having detected infected machines within your own network.